Chapter 13. Cyber Detective
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Find contact information on the Web
Locate court records on the Web
Locate criminal records on the Web
Use Usenet newsgroups to gather information
Introduction
In the preceding chapters we have examined many facets of computer security. Three of those issues led us to the content of this chapter. The first is identity theft, the second is hacking, and the third is investigating potential employees for sensitive positions.
In order for a criminal to perpetrate identity theft, she has to take a small amount of information she finds on her target and use that to garner even more information. Perhaps a ...
Get Computer Security Fundamentals, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.